期刊文献+

抵抗物理克隆攻击的车载遥控门锁双因子认证协议

Vehicle RKE two-factor authentication protocol resistant to physical cloning attack
下载PDF
导出
摘要 攻击者通过伪造车辆遥控钥匙发送的无线射频识别(RFID)信号可以非法开启车辆;而且当车辆遥控钥匙丢失或被盗窃,攻击者可以获取钥匙内部秘密信息并克隆出可用的车辆遥控钥匙,会对车主的财产与隐私安全造成威胁。针对上述问题,提出一种抵抗物理克隆攻击的车载遥控门锁(RKE)双因子认证(VRTFA)协议。该协议基于物理不可克隆函数(PUF)和生物指纹特征提取与恢复函数,使合法车辆遥控钥匙的特定硬件物理结构无法被伪造。同时,引入生物指纹因子构建双因子身份认证协议,消除车辆遥控钥匙被盗用的安全隐患,进一步保障车载RKE系统的安全双向认证。利用BAN逻辑对协议进行安全性分析的结果表明,VRTFA协议可以抵抗伪造攻击、去同步攻击、重放攻击、中间人攻击、物理克隆攻击以及密钥全泄漏攻击等恶意攻击,并满足前向安全性、双向认证性、数据完整性和不可追踪性等安全属性。性能分析表明,VRTFA协议与现有的RFID认证协议相比具有更强的安全性与隐私性和更好的实用性。 Attackers can illegally open a vehicle by forgeing the Radio Frequency IDentification(RFID)signal sent by the vehicle remote key.Besides,when the vehicle remote key is lost or stolen,the attacker can obtain the secret data inside the vehicle remote key and clone a usable vehicle remote key,which will threaten the property and privacy security of the vehicle owner.Aiming at the above problems,a Vehicle RKE Two-Factor Authentication(VRTFA)protocol for vehicle Remote Keyless Entry(RKE)that resists physical cloning attack was proposed.The protocol is based on Physical Uncloneable Function(PUF)and biological fingerprint feature extraction and recovery functions,so that the specific hardware physical structure of the legal vehicle remote key cannot be forged.At the same time,the biological fingerprint factor was introduced to build a two-factor authentication protocol,thereby solving the security risk of vehicle remote key theft,and further guaranteeing the secure mutual authentication of vehicle RKE system.Security analysis results of the protocol using BAN logic show that VRTFA protocol can resist malicious attacks such as forgery attack,desynchronization attack,replay attack,man-in-the-middle attack,physical cloning attack,and full key leakage attack,and satisfy the security attributes such as forward security,mutual authentication,data integrity,and untraceability.Performance analysis results show that VRTFA protocol has stronger security and privacy and better practicality than the existing RFID authentication protocols.
作者 刘长庚 刘亚丽 陆琪鹏 李涛 林昌露 祝义 LIU Changgeng;LIU Yali;LU Qipeng;LI Tao;LIN Changlu;ZHU Yi(College of Computer Science and Technology,Jiangsu Normal University,Xuzhou Jiangsu 221116,China;Fujian Provincial Key Laboratory of Network Security and Cryptology(Fujian Normal University),Fuzhou Fujian 350117,China;Guangxi Key Laboratory of Cryptography and Information Security(Guilin University of Electronic Technology),Guilin Guangxi 541004,China)
出处 《计算机应用》 CSCD 北大核心 2023年第11期3375-3384,共10页 journal of Computer Applications
基金 国家自然科学基金资助项目(61702237) 徐州市科技计划项目(KC22052) 福建省网络安全与密码技术重点实验室(福建师范大学)开放课题(NSCL-KF2021-04) 广西密码学与信息安全重点实验室(桂林电子科技大学)研究课题(GCIS202114) 江苏师范大学研究生科研与实践创新计划项目(2021XKT1382,2022XKT1488) 教育部产学合作协同育人项目(202101374001)。
关键词 车载遥控门锁 无线射频识别 双向认证 双因子 物理不可克隆函数 vehicle Remote Keyless Entry(RKE) Radio Frequency Identification(RFID) mutual authentication twofactor Physical Uncloneable Function(PUF)
  • 相关文献

参考文献11

二级参考文献79

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2韦鹏程,张伟,廖晓峰,杨华千.基于双混沌系统的带秘密密钥散列函数构造[J].通信学报,2006,27(9):27-33. 被引量:19
  • 3Feldhofer M. Comparison of low-power implementations of Trivium and Grain//Proceedings of the Workshop on the State of the Art of Stream Ciphers (SASC 2007). Bochum, Germany, 2007:236-246.
  • 4Feldhofer M, Wolkerstorfer J. Strong crypto for RFID tags--A comparison of low-power hardware implementations//Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 2007). New Orleans, USA, 2007, 27-30.
  • 5Haitner I, Reingold O, Vadhan S. Efficiency improvements in constructing pseudorandom generator from any one-way function//Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC 2010). Cambridge, USA, 2010: 437-446.
  • 6Juels A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394.
  • 7Juels A, Pappu R, Parno B. Unidirectional key distribution across time and space with applications to RFID security// Proceedings of the 17th USENIX Security Symposium. San Jose, Canada, 2008:75-90.
  • 8Molnar D, Wagner D. Privacy and security in library RFID.. Issues, practices, and arehitectures//Proceedings of the Conference on Computer and Communications Security (ACM CCS'04). Washington, USA, 2004:210-219.
  • 9Li Y, Ding X. Protecting RFID communications in supply chains//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS' 07). Singapore, Singapore, 2007: 234-241.
  • 10Ma C, Li Y, Deng R, Li T. RFID privacy.. Relation between two notions, minimal condition, and efficient construction// Proceedings of the 16th ACM Conference on Computer and Communications Security (ACM CCS- 09). Chicago, USA, 2009, 54-65.

共引文献166

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部